Conversation
Recompile all 30 lock files with gh-aw v0.71.1 compiler to pick up changes from recently merged workflow .md updates. Key changes: - Remove sha256 digest pins from container image references - smoke-services.lock.yml updates from #2214 Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Update sandbox.mcp.version from v0.2.29 to v0.3.0 in: - smoke-claude.md - smoke-codex.md - smoke-copilot.md All 30 workflows now use mcpg v0.3.0. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
This comment has been minimized.
This comment has been minimized.
There was a problem hiding this comment.
Pull request overview
Recompiles the repository’s agentic workflow lock files using the gh-aw v0.71.1 compiler so the committed .lock.yml outputs reflect recent .md workflow changes and updated pinned action metadata.
Changes:
- Recompiled ~30 agentic workflow
.lock.ymlfiles to match current.mdsources. - Updated MCP gateway / GitHub MCP server container references in compiled output (notably dropping inline
@sha256:...in several places). - Refreshed
.github/aw/actions-lock.jsonwith the latest action pins used by the compiler/templates.
Show a summary per file
| File | Description |
|---|---|
| .github/workflows/update-release-notes.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/test-coverage-improver.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/smoke-services.lock.yml | Recompiled lock output; incorporates smoke-services workflow updates (but includes a host-access regression). |
| .github/workflows/smoke-opencode.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/smoke-gemini.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/smoke-copilot.lock.yml | Recompiled lock output; MCP server container reference updated. |
| .github/workflows/smoke-copilot-byok.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/smoke-chroot.lock.yml | Recompiled lock output; MCP/CLI proxy image references updated. |
| .github/workflows/security-review.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/security-guard.lock.yml | Recompiled lock output; MCP/CLI proxy image references updated. |
| .github/workflows/secret-digger-copilot.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/secret-digger-codex.lock.yml | Recompiled lock output; mcpg image pinning behavior changed in at least one job. |
| .github/workflows/secret-digger-claude.lock.yml | Recompiled lock output; MCP gateway image reference updated. |
| .github/workflows/plan.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/pelis-agent-factory-advisor.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/issue-monster.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/issue-duplication-detector.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/firewall-issue-dispatcher.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/doc-maintainer.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/dependency-security-monitor.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/copilot-token-usage-analyzer.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/copilot-token-optimizer.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/cli-flag-consistency-checker.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/claude-token-usage-analyzer.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/claude-token-optimizer.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/ci-doctor.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/ci-cd-gaps-assessment.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/workflows/build-test.lock.yml | Recompiled lock output; MCP-related image references updated. |
| .github/aw/actions-lock.json | Updated action pin metadata used for workflow compilation. |
Copilot's findings
Tip
Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
- Files reviewed: 34/34 changed files
- Comments generated: 2
| sudo -E awf --container-workdir "${GITHUB_WORKSPACE}" --mount "${RUNNER_TEMP}/gh-aw:${RUNNER_TEMP}/gh-aw:ro" --mount "${RUNNER_TEMP}/gh-aw:/host${RUNNER_TEMP}/gh-aw:ro" --env-all --exclude-env COPILOT_GITHUB_TOKEN --exclude-env GITHUB_MCP_SERVER_TOKEN --exclude-env MCP_GATEWAY_API_KEY --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.githubcopilot.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,docs.github.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.blog,github.com,github.githubassets.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,telemetry.enterprise.githubcopilot.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.googleapis.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs --audit-dir /tmp/gh-aw/sandbox/firewall/audit --session-state-dir /tmp/gh-aw/sandbox/agent/session-state --enable-host-access --allow-host-ports 80,443,8080 --image-tag 0.25.28,squid=sha256:844c18280f82cd1b06345eb2f4e91966b34185bfc51c9f237c3e022e848fb474,agent=sha256:a8834e285807654bf680154faa710d43fe4365a0868142f5c20e48c85e137a7a,api-proxy=sha256:93290f2393752252911bd7c39a047f776c0b53063575e7bde4e304962a9a61cb,cli-proxy=sha256:fdf310e4678ce58d248c466b89399e9680a3003038fd19322c388559016aaac7 --skip-pull --enable-api-proxy \ | ||
| -- /bin/bash -c 'GH_AW_NODE_EXEC="${GH_AW_NODE_BIN:-}"; if [ -z "$GH_AW_NODE_EXEC" ] || [ ! -x "$GH_AW_NODE_EXEC" ]; then GH_AW_NODE_EXEC="$(command -v node 2>/dev/null || echo node)"; fi; "$GH_AW_NODE_EXEC" ${RUNNER_TEMP}/gh-aw/actions/copilot_driver.cjs /usr/local/bin/copilot --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --no-ask-user --allow-all-tools --allow-all-paths --add-dir "${GITHUB_WORKSPACE}" --prompt-file /tmp/gh-aw/aw-prompts/prompt.txt' 2>&1 | tee -a /tmp/gh-aw/agent-stdio.log |
There was a problem hiding this comment.
smoke-services.md describes this workflow as validating --allow-host-service-ports for Redis/Postgres, but the compiled lock is now running awf with --enable-host-access --allow-host-ports 80,443,8080 instead. That both weakens the intended restriction (opens common web ports instead of just 6379/5432) and means the smoke test is no longer exercising the flag it claims to validate. Recompile/fix the lock output so the awf invocation uses --allow-host-service-ports 6379,5432 (and does not enable broad host access).
| sudo chmod +x /usr/local/bin/awf | ||
| - name: Download container images | ||
| run: bash "${RUNNER_TEMP}/gh-aw/actions/download_docker_images.sh" ghcr.io/github/gh-aw-firewall/agent:0.25.28@sha256:a8834e285807654bf680154faa710d43fe4365a0868142f5c20e48c85e137a7a ghcr.io/github/gh-aw-firewall/api-proxy:0.25.28@sha256:93290f2393752252911bd7c39a047f776c0b53063575e7bde4e304962a9a61cb ghcr.io/github/gh-aw-firewall/squid:0.25.28@sha256:844c18280f82cd1b06345eb2f4e91966b34185bfc51c9f237c3e022e848fb474 ghcr.io/github/gh-aw-mcpg:v0.3.0@sha256:9c2228324fb1f26f39dc9471612e530ae3efc3156dac05efb2e8d212878d454d | ||
| run: bash "${RUNNER_TEMP}/gh-aw/actions/download_docker_images.sh" ghcr.io/github/gh-aw-firewall/agent:0.25.28@sha256:a8834e285807654bf680154faa710d43fe4365a0868142f5c20e48c85e137a7a ghcr.io/github/gh-aw-firewall/api-proxy:0.25.28@sha256:93290f2393752252911bd7c39a047f776c0b53063575e7bde4e304962a9a61cb ghcr.io/github/gh-aw-firewall/squid:0.25.28@sha256:844c18280f82cd1b06345eb2f4e91966b34185bfc51c9f237c3e022e848fb474 ghcr.io/github/gh-aw-mcpg:v0.3.0 |
There was a problem hiding this comment.
This job now downloads ghcr.io/github/gh-aw-mcpg:v0.3.0 without an @sha256:... digest pin. That makes the workflow non-reproducible and weakens supply-chain guarantees compared to the other pulled images (and compared to other jobs in this same lock file that still pin mcpg by digest). Keep the mcpg image reference pinned by digest here as well (and ensure any subsequent docker run of mcpg uses the same pinned image).
| run: bash "${RUNNER_TEMP}/gh-aw/actions/download_docker_images.sh" ghcr.io/github/gh-aw-firewall/agent:0.25.28@sha256:a8834e285807654bf680154faa710d43fe4365a0868142f5c20e48c85e137a7a ghcr.io/github/gh-aw-firewall/api-proxy:0.25.28@sha256:93290f2393752252911bd7c39a047f776c0b53063575e7bde4e304962a9a61cb ghcr.io/github/gh-aw-firewall/squid:0.25.28@sha256:844c18280f82cd1b06345eb2f4e91966b34185bfc51c9f237c3e022e848fb474 ghcr.io/github/gh-aw-mcpg:v0.3.0 | |
| run: bash "${RUNNER_TEMP}/gh-aw/actions/download_docker_images.sh" ghcr.io/github/gh-aw-firewall/agent:0.25.28@sha256:a8834e285807654bf680154faa710d43fe4365a0868142f5c20e48c85e137a7a ghcr.io/github/gh-aw-firewall/api-proxy:0.25.28@sha256:93290f2393752252911bd7c39a047f776c0b53063575e7bde4e304962a9a61cb ghcr.io/github/gh-aw-firewall/squid:0.25.28@sha256:844c18280f82cd1b06345eb2f4e91966b34185bfc51c9f237c3e022e848fb474 ghcr.io/github/gh-aw-mcpg:v0.3.0@sha256:9c2228324fb1f26f39dc9471612e530ae3efc3156dac05efb2e8d212878d454d |
|
Smoke Test Results:
Overall: PASS
|
Smoke Test: Copilot BYOK (Offline) Mode
Running in BYOK offline mode ( Overall: PASS (core BYOK path confirmed; pre-step template variables were not expanded) PR by @lpcox · reviewers:
|
🔬 Smoke Test Results
Overall: FAIL — PR: chore: recompile all agentic workflows by @lpcox
|
|
Smoke test: Warning Firewall blocked 1 domainThe following domain was blocked by the firewall during workflow execution:
network:
allowed:
- defaults
- "registry.npmjs.org"See Network Configuration for more information.
|
Smoke Test: Services Connectivity — ❌ FAIL
|
🏗️ Build Test Suite Results
Overall: 8/8 ecosystems passed — ✅ PASS
|
Summary
Recompiles all 30 lock files with the gh-aw v0.71.1 compiler to pick up changes from recently merged workflow
.mdupdates.Changes
@sha256:...digest pins from container image references (mcpg, github-mcp-server)smoke-services.lock.ymlpicks up changes from feat: optimize Smoke Services workflow for token efficiency #2214actions-lock.jsonupdated with latest action pinsNo source code changes
Only compiled workflow output (
.lock.yml) and action lock metadata.